Re: [PATCH userspace] libsemanage: include more parameters in the module checksum

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Thu, Mar 9, 2023 at 9:41 AM Ondrej Mosnacek <omosnace@xxxxxxxxxx> wrote:
>
> The check_ext_changes option currently assumes that as long as the
> module content is unchanged, it is safe to assume that the policy.linked
> file doesn't need to be rebuilt. However, there are some additional
> parameters that can affect the content of this policy file, namely:
> * the disable_dontaudit and preserve_tunables flags
> * the target_platform and policyvers configuration values
>
> Include these in the checksum so that the option works correctly when
> only some of these input values are changed versus the current state.
>
> Fixes: 286a679fadc4 ("libsemanage: optionally rebuild policy when modules are changed externally")
> Signed-off-by: Ondrej Mosnacek <omosnace@xxxxxxxxxx>

Acked-by: Stephen Smalley <stephen.smalley.work@xxxxxxxxx>

Feel free to merge it. I was wondering if we ought to somehow unify
the logic around do_rebuild and check_ext_changes to ensure that an
update to one is also reflected in the other but that can be done
later. I don't think do_rebuild currently is set based on
target_platform or policyvers, likely because we don't ever change the
former and we only change the latter for libsepol upgrades that
support newer kernel policy versions and the kernel will cheerfully
accept the older policy versions (and the new policy version likely
won't be leveraged until there is an actual change to a policy module
to use some new feature).

> ---
>  libsemanage/src/direct_api.c | 31 +++++++++++++++++++++++++++++--
>  1 file changed, 29 insertions(+), 2 deletions(-)
>
> diff --git a/libsemanage/src/direct_api.c b/libsemanage/src/direct_api.c
> index 7aa081ab..d740070d 100644
> --- a/libsemanage/src/direct_api.c
> +++ b/libsemanage/src/direct_api.c
> @@ -863,6 +863,14 @@ static void update_checksum_with_len(Sha256Context *context, size_t s)
>         Sha256Update(context, buffer, 8);
>  }
>
> +static void update_checksum_with_bool(Sha256Context *context, bool b)
> +{
> +       uint8_t byte;
> +
> +       byte = b ? UINT8_C(1) : UINT8_C(0);
> +       Sha256Update(context, &byte, 1);
> +}
> +
>  static int semanage_compile_module(semanage_handle_t *sh,
>                                    semanage_module_info_t *modinfo,
>                                    Sha256Context *context)
> @@ -977,13 +985,21 @@ static int modinfo_cmp(const void *a, const void *b)
>         return strcmp(ma->name, mb->name);
>  }
>
> +struct extra_checksum_params {
> +       int disable_dontaudit;
> +       int preserve_tunables;
> +       int target_platform;
> +       int policyvers;
> +};
> +
>  static int semanage_compile_hll_modules(semanage_handle_t *sh,
>                                         semanage_module_info_t *modinfos,
>                                         int num_modinfos,
> +                                       const struct extra_checksum_params *extra,
>                                         char *cil_checksum)
>  {
>         /* to be incremented when checksum input data format changes */
> -       static const size_t CHECKSUM_EPOCH = 1;
> +       static const size_t CHECKSUM_EPOCH = 2;
>
>         int i, status = 0;
>         char cil_path[PATH_MAX];
> @@ -1000,6 +1016,10 @@ static int semanage_compile_hll_modules(semanage_handle_t *sh,
>
>         Sha256Initialise(&context);
>         update_checksum_with_len(&context, CHECKSUM_EPOCH);
> +       update_checksum_with_bool(&context, !!extra->disable_dontaudit);
> +       update_checksum_with_bool(&context, !!extra->preserve_tunables);
> +       update_checksum_with_len(&context, (size_t)extra->target_platform);
> +       update_checksum_with_len(&context, (size_t)extra->policyvers);
>
>         /* prefix with module count to avoid collisions */
>         update_checksum_with_len(&context, num_modinfos);
> @@ -1134,6 +1154,7 @@ static int semanage_direct_commit(semanage_handle_t * sh)
>         mode_t mask = umask(0077);
>         struct stat sb;
>         char modules_checksum[CHECKSUM_CONTENT_SIZE + 1 /* '\0' */];
> +       struct extra_checksum_params extra;
>
>         int do_rebuild, do_write_kernel, do_install;
>         int fcontexts_modified, ports_modified, seusers_modified,
> @@ -1274,8 +1295,14 @@ static int semanage_direct_commit(semanage_handle_t * sh)
>                         goto cleanup;
>                 }
>
> +               extra = (struct extra_checksum_params){
> +                       .disable_dontaudit = sepol_get_disable_dontaudit(sh->sepolh),
> +                       .preserve_tunables = sepol_get_preserve_tunables(sh->sepolh),
> +                       .target_platform = sh->conf->target_platform,
> +                       .policyvers = sh->conf->policyvers,
> +               };
>                 retval = semanage_compile_hll_modules(sh, modinfos, num_modinfos,
> -                                                     modules_checksum);
> +                                                     &extra, modules_checksum);
>                 if (retval < 0) {
>                         ERR(sh, "Failed to compile hll files into cil files.\n");
>                         goto cleanup;
> --
> 2.39.2
>




[Index of Archives]     [Selinux Refpolicy]     [Linux SGX]     [Fedora Users]     [Fedora Desktop]     [Yosemite Photos]     [Yosemite Camping]     [Yosemite Campsites]     [KDE Users]     [Gnome Users]

  Powered by Linux